Multiple Choice
An attacker embedded a macro within a word processing file opened by a user in an organization's legal department. The attacker used this technique to gain access to confidential financial data. Which two recommendations should a security expert make to mitigate this type of attack? (Choose two.)
A) controlled folder access
B) removable device restrictions
C) signed macro requirements
D) firewall rules creation
E) network access control
Correct Answer:

Verified
Correct Answer:
Verified
Q1: Which scripts will search a log file
Q2: What is the function of a disassembler?<br>A)
Q4: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1178/.jpg" alt=" Refer to the
Q5: An "unknown error code" is appearing on
Q6: Which information is provided bout the object
Q7: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1178/.jpg" alt=" Refer to the
Q8: A scanner detected a malware-infected file on
Q9: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1178/.jpg" alt=" Refer to the
Q10: A security team receives reports of multiple
Q11: Which technique is used to evade detection